Go H*ck Yourself


Book Description

Learn firsthand just how easy a cyberattack can be. Go Hack Yourself is an eye-opening, hands-on introduction to the world of hacking, from an award-winning cybersecurity coach. As you perform common attacks against yourself, you’ll be shocked by how easy they are to carry out—and realize just how vulnerable most people really are. You’ll be guided through setting up a virtual hacking lab so you can safely try out attacks without putting yourself or others at risk. Then step-by-step instructions will walk you through executing every major type of attack, including physical access hacks, Google hacking and reconnaissance, social engineering and phishing, malware, password cracking, web hacking, and phone hacking. You’ll even hack a virtual car! You’ll experience each hack from the point of view of both the attacker and the target. Most importantly, every hack is grounded in real-life examples and paired with practical cyber defense tips, so you’ll understand how to guard against the hacks you perform. You’ll learn: How to practice hacking within a safe, virtual environment How to use popular hacking tools the way real hackers do, like Kali Linux, Metasploit, and John the Ripper How to infect devices with malware, steal and crack passwords, phish for sensitive information, and more How to use hacking skills for good, such as to access files on an old laptop when you can’t remember the password Valuable strategies for protecting yourself from cyber attacks You can’t truly understand cyber threats or defend against them until you’ve experienced them firsthand. By hacking yourself before the bad guys do, you’ll gain the knowledge you need to keep you and your loved ones safe.




What To Do When You Get Hacked


Book Description

What To Do When You Get Hacked: A Practitioner’s Guide to Incident Response in the 21st Century teaches you everything that you need to know about preparing your company for a potential data breach. We begin by talking about what the latest cybersecurity threats and attacks are that your company needs to be prepared for. Once we establish that, we go into the different phases of the incident response lifecycle based on the NIST framework. This will teach you how to properly prepare and respond to cybersecurity incidents so that you can be sure to minimize damage and fulfill all of your legal requirements during a cyberattack. This book is meant for the everyday business owner and makes these concepts simple to understand and apply.




Hacking For Dummies


Book Description

Stop hackers before they hack you! In order to outsmart a would-be hacker, you need to get into the hacker’s mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penetration testing, vulnerability assessments, security best practices, and every aspect of ethical hacking that is essential in order to stop a hacker in their tracks. Whether you’re worried about your laptop, smartphone, or desktop computer being compromised, this no-nonsense book helps you learn how to recognize the vulnerabilities in your systems so you can safeguard them more diligently—with confidence and ease. Get up to speed on Windows 10 hacks Learn about the latest mobile computing hacks Get free testing tools Find out about new system updates and improvements There’s no such thing as being too safe—and this resourceful guide helps ensure you’re protected.




How To Steal The White House


Book Description

Guaranteeing election outcomes is a very big deal. Big but dodgy. Billions are at stake if the algorithms in the new electronic voting systems can determine the President. After all, someone has to programme them. An elite team from the British Secret Services investigate this latest threat to democracy. This is book one of The Nines series about a new secret unit in UK intelligence. Formed specifically to deal with the more unusual threats facing the modern world as it enters the third decade of the new millennium they tackle hijacking democracy , pandemic viruses , theft in cyberspace and more. Each member has been specially selected for their individual skills but there is also a recurring theme in the recruitment process. All six have exceptionally high IQ's which rank them in the top ninety ninth percentile of the general population. Hence their nickname.They are unarmed and defuse situations and danger with a mix of intellect and humour. Always more effective than guns and bullets.And much more entertaining. Their boss, Commander Harry Shepperton, is Ten. ' We don't do dead bodies in hotels any more,' he likes to remind everyone. 'Hell, people have to sleep in those places' Demos kratos. The people should rule. Only they don't.




The Circle of Lies


Book Description

Four girls at a southwestern boarding school discover they have amazing feline powers and must unite to stop an ancient evil in the second riveting adventure of the Hunters of Chaos series. Ana’s life changed dramatically when she accepted a position at an exclusive boarding school in New Mexico. She found three great new friends—Shani, Doli, and Lin—and together, they discovered that they each had the power to turn into a wildcat. Their new friendship and powers were put to the test in a battle against the god Anubis and his newly resurrected Brotherhood of Chaos. After defeating the Brotherhood, Ana learns that her aunt and uncle have gone missing. Her friends are ready to help her find them, but then Shani is accused of vandalizing school property and expelled. While Ana and the others head to Mexico to search for her family, Shani travels to Mumbai to stay with her father. But strange things are happening in the Indian city. Has she stumbled upon another sinister plot? Meanwhile, Ana, Doli, and Lin have gone to Mexico to try and track down Ana’s family, and in the heart of Chichen Itxa, they find new dangers—and more proof of the Brotherhood’s growing power. With the four wildcats separated by thousands of miles, is this Anubis’s chance to rise again?




Violent Python


Book Description

Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus. - Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts - Write code to intercept and analyze network traffic using Python. Craft and spoof wireless frames to attack wireless and Bluetooth devices - Data-mine popular social media websites and evade modern anti-virus




Faded Into You


Book Description

Fighting love is futile... Ravinder Raja never saw himself as a jealous person, but when his best friend, Alfred, begins preparations to get married, Ravinder can't help feeling alone. While kicking his best-man duties into high gear, he finds a job in India working as the PR rep for a wounded security company. He just wants to get away from all things &‘wedding' until he has to face the music. He never expected Thaddeus Masterson and the way Ravinder's body betrays him when it comes to the sexy ex-hacker. When he was younger, Thaddeus Masterson got into some serious trouble. But now, reformed and fresh from working with the FBI, he's decided to go back into business for himself—legally. When a friend's company is brought to its knees by hackers, Thaddeus packs his stuff and jets off to India. It's the last place he expects to find love. But, as they say, love always finds a way.




Hunters of Chaos


Book Description

"Four girls discover that they are part of a timeless battle that pits good against evil. They have the ability to turn into large cats and an ancient duty to protect civilization from evil demons who want to rule"--




VoIP Hacks


Book Description

Voice over Internet Protocol is gaining a lot of attention these days. Both practical and fun, this text provides technology enthusiasts and voice professionals with dozens of hands-on projects for building a VoIP network, including a softPBX.




Augmented


Book Description

The Internet and smartphone are just the latest in a 250-year- long cycle of disruption that has continuously changed the way we live, the way we work and the way we interact. The coming Augmented Age, however, promises a level of disruption, behavioural shifts and changes that are unparalleled. While consumers today are camping outside of an Apple store waiting to be one of the first to score a new Apple Watch or iPhone, the next generation of wearables will be able to predict if we’re likely to have a heart attack and recommend a course of action. We watch news of Google’s self-driving cars, but don’t likely realise this means progressive cities will have to ban human drivers in the next decade because us humans are too risky. Following on from the Industrial or machine age, the space age and the digital age, the Augmented Age will be based on four key disruptive themes—Artificial Intelligence, Experience Design, Smart Infrastructure, and HealthTech. Historically the previous ‘ages’ bought significant disruption and changes, but on a net basis jobs were created, wealth was enhanced, and the health and security of society improved. What will the Augmented Age bring? Will robots take our jobs, and AI’s subsume us as inferior intelligences, or will this usher in a new age of abundance? Augmented is a book on future history, but more than that, it is a story about how you will live your life in a world that will change more in the next 20 years than it has in the last 250 years. Are you ready to adapt? Because if history proves anything, you don't have much of a choice.